Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Trust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computing

  • Conference paper
  • First Online:
Current Problems in Applied Mathematics and Computer Science and Systems (APAMCS 2022)

Abstract

Cyber-physical systems are widely used. Nevertheless, security issues are quite acute for them. First of all, because the system must work constantly without downtime and failures. The Cyber-Physical System (CPS) must quickly transfer the parameters to the monitoring system, but if the system is not flexible enough, fast and optimal, then collisions and additional loads on the CPS may occur. This study proposes a system for monitoring and detecting anomalies for CPS based on the principles of trust, which allows you to verify the correctness of the system and detect possible anomalies. In our study, we focus on traffic analysis and analysis of the CPU operation, since these parameters are the most critical in the operation of the CPS itself. The technique is based on computationally simple algorithms and allows to analyze the basic parameters that are typical for most CPS. These factors make it highly scalable and applicable to various types of CPS, despite the fragmentation and a large number of architectures. A distributed application architecture was developed for monitoring and analyzing trust in the CPS. The calculation results show the possibility of detecting the consequences of the influences of denial-of-service attacks or CPS. In this case, three basic parameters are sufficient for detection. Thus, one of the features of the system is reflexivity in detecting anomalies, that is, we force devices to independently analyze their behavior and make a decision about the presence of anomalies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Choi, S., Woo, J., Kim, J., Lee, J.Y.: Digital twin-based integrated monitoring system: korean application cases. Sensors 22, 5450 (2022). https://doi.org/10.3390/s22145450

    Article  Google Scholar 

  2. Yang, B., Xin, L., Long, Z.: An improved residual-based detection method for stealthy anomalies on mobile robots. Machines 10, 446 (2022). https://doi.org/10.3390/machines10060446

    Article  Google Scholar 

  3. Kotenko, I.V.: Primenenie tekhnologii upravleniya informaciej i sobytiyami bezopasnosti dlya zashchity informacii v kriticheski vazhnyh infrastrukturah. Trudy SPIIRAN Vyp 1, 2–7 (2012)

    Google Scholar 

  4. Lavrova, D.S., Zaitseva, E.A., Zegzhda, D.P.: Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time. Autom. Control. Comput. Sci. 53(5), 387–392 (2019). https://doi.org/10.3103/S0146411619050067

    Article  Google Scholar 

  5. Stevens, M.: Security Information and Event Management (SIEM). In Proceedings of the NEbraska CERT Conference, Omaha, NE, USA, 9–11 August 2005. http://www.certconf.org/presentations/2005/files/WC4.pdf

  6. Knapp, E.D., Langill, J.T.: Chapter 12-Security Monitoring of Industrial Control Systems. In: Eric, D., Knapp, J.T. (eds.) Industrial Network Security, 2nd ed., pp. 351–386. Syngress, New York (2015)

    Google Scholar 

  7. Lavrova, D.S.: Podhod k razrabotke SIEM-sistemy dlya Interneta veshchej. Probl. Inf. Bezopasnosti. Komp’yuternye Sist. 2, 51–59 (2016)

    Google Scholar 

  8. Siddiqui, S., Khan, M.S., Ferens, K., Kinsner, W.: Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats. In: Proceedings of the 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Oxford, UK, 26–28 July 2017; pp. 297–308 (2017)

    Google Scholar 

  9. Wang, C., Wang, D., Xu, G., He, D.: Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci. China Inf. Sci. 65(1), 1–15 (2021). https://doi.org/10.1007/s11432-020-2975-6

    Article  MathSciNet  Google Scholar 

  10. Jiang, Y., Yin, S., Kaynak, O.: Data-driven monitoring and safety control of industrial cyber-physical systems: basics and beyond. IEEE Access 6, 47374–47384 (2018)

    Article  Google Scholar 

  11. Poltavtseva, M., Shelupanov, A., Bragin, D., Zegzhda, D., Alexandrova, E.: Key concepts of systemological approach to CPS adaptive information security monitoring. Symmetry 13, 2425 (2021). https://doi.org/10.3390/sym13122425

    Article  Google Scholar 

  12. Duhayyim, M.A., et al.: Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Appl. Sci. 12, 6875 (2022). https://doi.org/10.3390/app12146875/

  13. Thakur, S., Chakraborty, A., De, R., Kumar, N., Sarkar, R.: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Comput. Electr. Eng. 91, 107044 (2021)

    Article  Google Scholar 

  14. Sauer, F., Niedermaier, M., Kiebling, S., et al.: LICSTER – a low-cost ICS security testbed for education and research. In: 6th International Symposium for ICS & SCADA Cyber Security Research (2019). https://doi.org/10.14236/ewic/icscsr19.1

  15. Gamec, J., Basan, E., Basan, A., Nekrasov, A., Fidge, C., Sushkin, N.: An adaptive protection system for sensor networks based on analysis of neighboring nodes. Sensors 21, 6116 (2021). https://doi.org/10.3390/s21186116

    Article  Google Scholar 

  16. Basan, E., Basan, A., Nekrasov, A.: Method for detecting abnormal activity in a group of mobile robots. Sensors 19, 4007 (2019). https://doi.org/10.3390/s19184007/

    Article  Google Scholar 

  17. Basan, E., Basan, A., Makarevich, O.: Detection of anomalies in the robotic system based on the calculation of kullback-leibler divergence. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2019, pp. 337-340 (2019). https://doi.org/10.1109/CyberC.2019.00064

Download references

Acknowledgments

The research was supported by the Council for Grants of the President of the Russian Federation at the expense of the scholarship of the President of the Russian Federation for young scientists and graduate students (Competition SP-2022) No. SP-858.2022.5 on the topic “Technology for ensuring cybersecurity of automated systems from active information attacks based on the principle of reflection”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Basan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Basan, E., Lapina, M., Lesnikov, A., Basyuk, A., Mogilny, A. (2023). Trust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computing. In: Alikhanov, A., Lyakhov, P., Samoylenko, I. (eds) Current Problems in Applied Mathematics and Computer Science and Systems. APAMCS 2022. Lecture Notes in Networks and Systems, vol 702. Springer, Cham. https://doi.org/10.1007/978-3-031-34127-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34127-4_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34126-7

  • Online ISBN: 978-3-031-34127-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics